Suelo ignorar gente campeonamente.

Joined November 2010
I'm Castor Troy retweeted
Knowing how to write assembly is a skill you should learn, and these guys have a great resource for you! I've debugged 10,000 lines of assembly for every line I've ever written... but writing assembly from scratch is a core computer science skill, I believe: even if you never use it. Will you use it to write new code? Maybe not. But when you get dropped into a call stack without source code, at least you won't have to ask your Dad for help! And the next thing you should do after learning to write ASM is to get a crisp understanding of what your C code actually compiles to. Like a switch() statement is often a jump table, but if you've never debugged one...
Our assembly lessons are trending on @github ! We have nearly 10k stars.
66
235
7
3,326
I'm Castor Troy retweeted
Replying to @halvarflake
You explicitly state, right there, that the point of the disclosure is to put pressure on @FFmpeg, thanks for clarifying the purpose of the disclosure. This is exactly the story I tell. You have the commons, managed by volunteers, and some guys come in and they say 'if you don't fix this barrier, I will report you to the city'. You say that it is meant to balance interests. Whose interests? The @FFmpeg gang makes the software available with *no warrantee*, for free (no $$$). You *do not get* to demand warrantees if you just grabbed the software off the Internet. By doing so, you are throwing the system off balance. The security researchers get paid. The guys maintaining FFmpeg do not. And as a response, the open-source developers are coming to the conclusion that security researchers are scum, that they are parasites. And that's precisely what too many security researchers are: they make a living off the free labor of open-source developers. « The reason bugs are disclosed isn't to get credit. » Of course it is. Let us not be naive. How could you get credit for a bug that is undisclosed ? How do you get on leaderboards if your bugs are undisclosed? We understand how the security research world works: find impressive bugs, get famous. This requires that the bugs be disclosed. There is no rational explanation for how the FFmpeg disclosure made anyone safer. The only purpose here is to gather fame. Google went to the press and made a big fuss about these bugs just to balance competing interests? This had nothing to do with furthering the careers of these engineers? If it was all about making us safer, that's what Google would have done, they would have patched the bugs, and then disclosed them, long after the patched version were available. No. They went to the press and bragged about disclosing unpatched bugs. It goes against the moral fiber of open-source software. That's not how it works.
6
15
1
125
I'm Castor Troy retweeted
Part 3: Containers Are Just Linux Processes In the previous part, we explored how PID namespaces isolate process trees, allowing each container to have its own “init” process and private view of running processes. Now that you understand how process isolation works at the kernel level, let’s zoom out for a moment. Before moving on to network namespaces, it’s important to grasp a key concept: containers aren’t virtual machines or special kernel objects, they’re just ordinary Linux processes. Tools like Docker, Podman, and containerd build on what the Linux kernel already provides. They bundle namespaces, cgroups, and a filesystem view into a single convenient abstraction and call that a container. But underneath, nothing extraordinary happens, the kernel is simply spawning and managing regular processes, just like it always has. Learn in more in this guide: blog.sysxplore.com/p/part-3-…
1
46
301
I'm Castor Troy retweeted
Want to understand B-trees better? Try btree.app and bplustree.app. These are standalone sandboxes of the visuals I built for my "B-trees and database indexes" article. Helpful for learning B-tree insertion, search, and node splits.
I'm Castor Troy retweeted
Fault injection for secure boot bypass and secret extraction targeting RP2350 usenix.org/system/files/woot… #infosec
36
151
In that sense, is the same way as religulous people.
I think about this several times per day. 🤣
I'm Castor Troy retweeted
Learn Linux, networking, containers, and Kubernetes by solving hands-on problems 🛠️ A curated collection of over 100 carefully crafted challenges - with interactive checks, clear diagrams, and helpful theoretical references. Like LeetCode but for DevOps labs.iximiuz.com/challenges
12
263
1,677
I'm Castor Troy retweeted
had a dinner with this guy in korea heard that he writes code seems cool
329
493
58
16,504
Funny how this Torvalds' quote fits perfectly with the @FFmpeg situation
it is because security researchers are mostly not-developers. why should we have to fix your fucking broken-ass shitty code?
11
114
5
1,985
I'm Castor Troy retweeted
Part 3: Containers Are Just Linux Processes In the previous part, we explored how PID namespaces isolate process trees, allowing each container to have its own “init” process and private view of running processes. Now that you understand how process isolation works at the kernel level, let’s zoom out for a moment. Before moving on to network namespaces, it’s important to grasp a key concept: containers aren’t virtual machines or special kernel objects, they’re just ordinary Linux processes. Tools like Docker, Podman, and containerd build on what the Linux kernel already provides. They bundle namespaces, cgroups, and a filesystem view into a single convenient abstraction and call that a container. But underneath, nothing extraordinary happens, the kernel is simply spawning and managing regular processes, just like it always has. Learn in more in this guide: blog.sysxplore.com/p/part-3-…
5
93
644
I'm Castor Troy retweeted
The security guarantees of modern TEE offerings by Intel and AMD can be broken cheaply and easily, by building a memory interposition device that allows attackers to physically inspect all memory traffic inside a DDR5 server. Source: tee.fail
I'm Castor Troy retweeted
Replying to @MotivacionesF
1
175
GIF
I'm Castor Troy retweeted
Forward Proxy vs Reverse Proxy
3
70
1
427
I'm Castor Troy retweeted
Very Impressive 🫵 Stun then Run!
I'm Castor Troy retweeted
"it's Python, you do anything and it allocates" How true is this? I modified CPython to print when it allocates an integer object Then added numbers in a for-loop 100k times My terminal got spammed with 101006 allocations Why? Let's explore the internals of CPython:
I will never forgive Rust for making me think to myself “I wonder if this is allocating” whenever I’m writing Python now
It happens, I've seen how it vanished.
This is probably the greatest skit of all time. 😂😂
I'm Castor Troy retweeted
Demostración de vulnerabilidad de cookies de sesión, donde un usuario normal puede modificar la petición HTTP y convertirse en un usuario con rol de administrador. #hackingetico #hackingweb #cookie #informatica
I'm Castor Troy retweeted
Pavel Durov(Telegram CEO) explains why he doesn't use a phone
14
93
5
1,045
0